|Número de publicación||US20100131084 A1|
|Tipo de publicación||Solicitud|
|Número de solicitud||US 12/323,057|
|Fecha de publicación||27 May 2010|
|Fecha de presentación||25 Nov 2008|
|Fecha de prioridad||25 Nov 2008|
|También publicado como||CN101739007A, EP2189900A1, US8914783|
|Número de publicación||12323057, 323057, US 2010/0131084 A1, US 2010/131084 A1, US 20100131084 A1, US 20100131084A1, US 2010131084 A1, US 2010131084A1, US-A1-20100131084, US-A1-2010131084, US2010/0131084A1, US2010/131084A1, US20100131084 A1, US20100131084A1, US2010131084 A1, US2010131084A1|
|Inventores||Kim O. Van Camp|
|Cesionario original||Van Camp Kim O|
|Exportar cita||BiBTeX, EndNote, RefMan|
|Citas de patentes (48), Otras citas (9), Citada por (31), Clasificaciones (6), Eventos legales (1)|
|Enlaces externos: USPTO, Cesión de USPTO, Espacenet|
The present disclosure relates generally to process control systems and, more particularly, to systems and methods to update and manage software in process control systems.
Process control systems, like those used in chemical, petroleum or other processes, typically include one or more centralized process controllers communicatively coupled to at least one host or operator workstation and to one or more field devices via analog, digital or combined analog/digital buses. The field devices, which may be, for example, device controllers, valves, valve positioners, switches and transmitters (e.g., temperature, pressure and flow rate sensors), perform functions within the process control system such as opening or closing valves and measuring process parameters. A central process controller receives signals indicative of process measurements made by the field devices and/or other information pertaining to the field devices, uses this information to implement a control routine and then generates control signals that are sent over the buses or other communication lines to the field devices to control the operation of the process control system.
A company may operate several process plants, each having one or more process control systems having different configurations. Performing hardware and software maintenance on such systems can be an arduous task. Because the process control systems may be located at different plant sites at different geographical locations, system engineers may be subject to frequent travel between each plant site. Alternatively, each plant site may have system engineers responsible for maintaining the hardware and software associated with the components of a process control system. In any case, maintaining a company's process control systems often involves numerous different maintenance procedures.
Maintaining a company's process control systems often involves installation and/or updating of software running on components of the process control systems. Owners of process controls systems often waste valuable time using undocumented, locally created methods to install patches specified by a system supplier. A user must download updates from an external system, and this process involves much time and expense. The customer must also determine which updates (e.g., security updates, etc.) to install. For many known systems, software update notices are currently sent to customers, and the customers manually update their control system controllers, workstations, etc., one at a time.
Example systems and methods to update and maintain process control systems are described. In accordance with an example, a method for deployment and management of software updates and upgrades for nodes of a process control system involves identifying at least one of an update or an upgrade applicable to a configuration of nodes of the process control system. Software is provided for download to the process control system. The software represents an update and/or upgrade. Metadata for the software indicating applicability of the software to one or more nodes of the process control system is also provided for download. Automated installation of the software to one or more nodes of the process control system is facilitated based on the metadata from a workstation in communication with the one or more nodes of the process control system.
In accordance with an example, an apparatus for deploying updates and upgrade to nodes in a process control system includes a service management system providing at least one of an update or an upgrade for one or more nodes in the process control system using a software delivery service to provide software and supporting information for the at least one of an update or an upgrade to a user-specified destination in the process control system without user initiation. The service management system identifies the at least one of an update or an upgrade based on a configuration of the process control system. The apparatus also includes a software deployment manager at the user-specified destination in the process control system. The software deployment manager includes a degree of automation configurable by a user. The software deployment manager downloads and installs the software from the software delivery service to the one or more nodes in the process control system based on the supporting information and the configuration of the process control system.
In accordance with an example, a machine accessible medium has instructions stored thereon that, when executed, cause a machine to identify at least one of an update or an upgrade applicable to a configuration of nodes of a process control system. The instructions, when executed, cause a machine to provide, for download to the process control system, software for the at least one of an update or an upgrade and metadata for the software indicating applicability of the software to one or more nodes of the process control system. The instructions, when executed, cause a machine to facilitate automated installation of the software to one or more nodes of the process control system based on the metadata from a workstation in communication with the one or more nodes of the process control system.
In accordance with an example, a method involves rendering a first display area via a graphical user interface to display one or more pending software updates and upgrades for one or more nodes of a process control system. The one or more pending software updates and upgrades are automatically received from a software delivery service based on a configuration of the process control system. User input is accepted to configure one or more groups of nodes for the process control system. User input is accepted to approve action regarding the one or more pending software updates and upgrades. Download and installation of the one or more pending software updates and upgrades is facilitated according to the user input and the configuration of the process control system.
Although the following describes example systems including, among other components, software and/or firmware executed on hardware, it should be noted that such systems are merely illustrative and should not be considered as limiting. For example, it is contemplated that any or all of these hardware, software, and firmware components could be embodied exclusively in hardware, exclusively in software, or in any combination of hardware and software. Accordingly, while the following describes example systems, persons of ordinary skill in the art will readily appreciate that the examples provided are not the only way to implement such systems.
Unlike known techniques for maintaining process control systems that involve using manual maintenance techniques to install or update software on the systems, the example methods and systems described herein may be used to implement an automated update and maintenance deployment tool that can be built into, integrated within, or implemented with a control system. More specifically, an example deployment manager tool described herein monitors remotely-located and/or local process control systems and associated equipment and receives over a network, such as the Internet and/or a private network, update files and metadata to automatically deploy updates where identified, for example. In one example, updates appropriate to a makeup of each system are determined by a supplier so a user does not have to identify the relevant updates. This enables a vendor to push updates to the system so the user does not have to pull the updates onto the system. A deployment agent in the system is programmed to accept and accommodate updates that have service disruption or reboot behaviors and presents options to a customer for installation at the customer's convenience. More generally, the deployment manager described herein understands the configuration of the control system within which it is integrated and/or implemented and only delivers updates and upgrades that are needed or appropriate for that system configuration.
For example, software updates may include security updates, anti-virus software, digital automation system updates and/or upgrades, operating system updates, and the like. A vendor may push particular update(s) and inform a customer which update(s) should be installed rather than requiring the customer to perform his or her own analysis and manually pull or retrieve (e.g., download) the relevant update(s). In certain examples, software updating is automated using a network-connected deployment tool (such as a Web-accessible machine in a control system) to obtain a bundle of one or more updates for each customer. A customer may then access any workstation in the system and update the entire system and/or a particular portion of the system. Such flexibility in software updating helps to reduce the amount of time and labor needed to execute the updating and helps to prevent update errors and ensure that updates occur on a regular basis. Further, the automated updating provided by the examples described herein provides a more robust control system to users.
In an example, the deployment manager downloads and delivers files for updates and upgrades for control system components. Updates may correct or otherwise address bugs and other issues associated with current software, and upgrades may represent new software versions, for example. Upgrades typically involve a relatively large amount of program code representing a new software version, whereas an upgrade or patch, which corrects a particular problem and/or adds a particular feature to existing software, typically involves a relatively large amount of program code.
In an example, a user can configure a deployment manager to be as automated or as user-controlled as desired. A deployment interface enables a user to configure a degree of autonomy for deployment tasks related to different types and/or sources of data, for example. Automated download and automated installation can be provided, for example. A user can automate downloads but configure a manual installation or vice versa, for example. A user can also configure deployment options on a computer by computer basis, according to groups of computers, for an entire network, for an entire process control system, etc. As an example, a user can select a lead group of machines (e.g., controllers, workstations, etc.) to automatically install and test an upgrade and then later deploy the upgrade to a remaining group of machines after the user has been able to evaluate how the lead group of machines is functioning with the upgrade.
Certain examples described herein can be used to deploy routine updates to a control system, such as a DeltaV™ digital automation system provided by Emerson Process Management. Additionally or alternatively, certain examples described herein can be used to update a flash version of a controller or Input/Output (“I/O”) card and/or to distribute a new version of digital automation software to the rest of a running system.
The process control system 100 scales in size and/or functionality. The process control system 100 can provide plug-and-play OPC (open connectivity via open standards) and XML (extensible markup language) integration, fieldbus, batch control, and advanced control technologies, for example.
The process control system 100 can also provide varying levels of redundancy. For example, an operator can choose a level of redundancy for an application, including: 1) redundant network communications (for example, Ethernet); 2) redundant controllers; 3) redundant power supplies; 4) redundant fieldbus interfaces and bus power; 5) redundant digital I/O; 6) redundant serial communications (for example, MODBUS, RS485, etc.); and 7) redundant workstations.
The process control system i 100 can provide flexible, system-wide security management for all users including operators, engineers, technicians, and other automation users based on user login, keys control system functionality and/or span of operator control. Security settings may include: 1) an operating span of control by plant area; 2) alarm limits, turning parameters change privilege; and/or 3) security by both user and by physical location for example.
The process control system 100 can also accommodate an addition of system components including controllers 106, I/O devices 108, field devices 110, and workstations 112, for example, while the system is powered and running. Thus, an operator can expand and upgrade the process control system 100) on the fly.
The process control system 100 can also support a full range of analog, discrete, thermocouple, and resistance temperature detectors (RTDs) for existing field devices, for example. The process control system 100 can include one or more sensor busses supportin installation and operation of discrete devices, such as pushbuttons, on/off valves, and proximity switches, for example. The system 100 can include one or more device busses that connect motor starters, drives, and other more complex devices, for example. The fieldbus 104, such as a FOUNDATION fieldbus, delivers predictive alerts, millisecond data capture, validated data, field-based control, diagnostics, and asset information bi-directionially within the digital automation system to help predict maintenance problems before they occur.
Devices can be automatically recognized by the process control system 100 as they are added, for example. The process control system 100 can coordinate aspects of automation engineering including but not limited to control strategies, process graphics, history, events, change management, and bulk editing and data entry, for example. The process control system 100 can also be used to develop types of control including but not limited to logic, regulatory, sequential, and advanced control, for example. The process control system 100 can further include one or more libraries of pre-defined control strategies, stress-tested digital bus devices files, etc.
The process control system 100 can provide digital automation systems with validated data, displaying quality, status, and diagnostics from field devices. As an example, alarm management is built on EEMUA 191, developed by a consortium of leading process industry automation users and suppliers, and designed to elimillate nuisance alarms. In particular, the process control system 100 can support EEMUA 191 standards by allowing operator suppression of alarms; time-stamp and history of suppressed alarms; removing suppressed alarms from alarm banner and alarm summary; and/or maintaining a suppressed alarm summary for example
The example methods and systems described herein involve using an example online maintenance system that is communicatively coupled to one or more remotely located process control systems and configured to monitor various aspects of the process control system to generate preventative and/or corrective maintenance information. For example, the example online maintenance system may be implemented using one or more maintenance servers at a central facility executing machine accessible instructions (e.g., computer code, software, etc.) that cause the maintenance servers to communicate via the Internet and/or other communication network(s) (e.g., a local area network (“LAN”), a wireless LAN (“WLAN”), a wide area network (“WAN”), etc.) with one or more remotely located process control system servers and that cause the maintenance servers to obtain process control system information (e.g., performance information, operating information, etc.) from the process control system servers.
The example online maintenance system described herein may analyze the process control system information to determine whether any preventative maintenance or corrective maintenance is available for any portion of the one or more process control systems. The process control system information may be indicative of various types of operating conditions of each process control system including, for example, the software and/or firmware executed by the equipment in each process control system, any equipment failures within the systems, operating efficiencies, part numbers and manufacturers of equipment used to implement the systems, and/or many other types of operating conditions. To detect whether maintenance procedures should be performed, in some example implementations, the example online maintenance system may compare at least some of the process control system information with knowledgebase articles (“KBA's”) (e.g., maintenance database entries) that describe issues (e.g., software bugs, equipment failures, operating anomalies, etc.) and suggested workarounds, fixes, or other maintenance procedures associated with overcoming or remedying the issues.
The example online maintenance system may be implemented using a web-based interface such as, for example, a web-based portal. In some example implementations, users may access the example online maintenance systems via virtually any computer system having network access and capable of rendering web pages. In this manner, unlike traditional techniques used to maintain process control systems, users may access maintenance information and perform maintenance procedures when located remotely from a process control system (e.g., not within the plant or off the process control system premises).
The example online maintenance system may also be implemented to provide a plurality of other features. For example, the example online maintenance system may be configured to send alerts via e-mail, pager, mobile phone, landline phone, really simple syndication (“RSS”), etc. to users (e.g., system operators, system engineers, maintenance engineers, etc.) if one or more particular conditions are met (e.g., a failure condition, a change in software or hardware, availability of firmware updates or software upgrades, etc.). The example online maintenance system may also generate various maintenance reports, monitor the lifecycle status of portions of the process control systems, organize and track information (e.g., expiration dates) associated with product warranty and support services, store and display status of open maintenance tickets or maintenance calls, and other features described below.
Now turning to
In the illustrated example, the main server 204 is configured to receive registration and/or configuration information associated with process control systems (e.g., example process control systems 218 and 220) monitored by the example online maintenance system 202. The registration and/or configuration information may include field device information, software information, firmware information, operational status information, maintenance information, lifecycle information, etc. associated with hardware, software, and/or firmware used to implement the components and devices of monitored process control systems 218 and 220. The main server 204 may receive the registration and/or configuration information during an enrollment process of a process control system (e.g., when a process control system is brought online for the first time to be monitored by the example online maintenance system 202). In addition, the main server 204 may receive new and/or updated registration and/or configuration information periodically and/or a periodically after an enrollment process to ensure that the example online maintenance system 202 has the latest and up-to-date information corresponding to monitored process control systems.
The main server 204 is also configured to monitor process control systems. For example, the main server 204 may be provided with software that, when executed, causes the main server 204 to monitor field devices and/or other components or devices of monitored process control systems based on, for example, the registration and/or configuration information received from the process control systems.
In the illustrated example, the web page server 206 is configured to create and serve web pages to operators of monitored process control systems. In the illustrated example, the web page server 206 serves web pages including one or more graphical user interfaces (“GUI's”). The web pages may be used by operators to provide information to and retrieve information from the example online maintenance system 202. For example, the web pages served by the web page server 206 may be used to register a process control system with the example online maintenance system 202 and to provide registration and/or configuration information to the main server 204.
In the illustrated example, the main server 204 and the web page server 206 are implemented separately to enable taking the web page server 206 offline without compromising the monitoring processes and registration/configuration information receiving processes performed by the main server 204. For example, the web page server 206 may be taken offline to perform maintenance (e.g., to add or upgrade web page interfaces, update security software, etc.) while the main server 204 continues to monitor process control systems.
In the illustrated example, the SMS server 208 is configured to store and process the registration/configuration information corresponding to each process control system monitored by the example online maintenance system 202. For example, the SMS server 208 may include and/or be communicatively coupled to one or more data structures (e.g., databases) that store the registration/configuration information. The SMS server 208 may also be configured to store knowledge base articles (“KBA's”) (e.g., maintenance database entries or other database entries that include maintenance information or other information about process systems and/or parts thereof) that describe issues (e.g., software bugs, equipment failures, operating anomalies, etc.) associated with different components or devices of process control systems. Typically, the KBA's also include suggested workarounds, fixes, or other maintenance procedures associated with overcoming or remedying the indicated issues. In the illustrated example, KBA's can be general type KBA's that are related to a process control system generally or KBA's can be specific device type KBA's that are related to specific parts (e.g., field devices, workstations, controllers, etc.) or portions (e.g., subsystems) of a process control system.
In the illustrated example, the SMS server 208 is configured to perform a KBA matching process. In general, the KBA matching process compares information stored in a KBA (e.g., identification information, device type information, or other criteria) to the registration/configuration information to determine which KBA's are applicable or relevant to which monitored process control systems.
The example online maintenance system 202 is communicatively coupled to a first site 210, a second site 212, and a third site 214 via the Internet (or other wide area network (“WAN”)) 216. A WAN may be implemented using, for example, a telephone line, a digital subscriber line (“DSL”), an integrated services digital network (“ISDN”), a broadband cable system, a broadband alternating current (“AC”) system, a satellite communication system, etc.
The sites 210, 212, and 214 may be part of a single enterprise (e.g., operated by the same business entity, company, corporation, etc.) and may include manufacturing sites, distribution sites, refinery sites, paper mills, or any other type of industrial or business site having operations associated with process control systems. While the first site 210 is illustrated in relatively more detail than the second and third sites 212 and 214, one or both of the second and third sites 212 and 214 may be implemented using configurations substantially similar or identical to (or different from) the illustrated configuration of the first site 210. In any case, the sites 210, 212, and 214 include one or more process control systems that are monitored and maintained using the example online maintenance system 202.
In the illustrated example, the first site 210 includes first and second distributed process control systems 218 and 220. The process control systems 218 and 220 may be used to perform substantially the same or different operations. For example, one of the process control systems 218 and 220 may be used to handle process fluids while the other may be used to operate a product manufacturing process. Of course, the process control systems 218 and 220 may be used to perform operations performed with any other type of process.
The first and second process control systems 218 and 220 include respective controllers 222 and 224, which are communicatively coupled to respective nodes 226 a-c and 228 a-b. At least some of the nodes 226 a-c and 228 a-b may include field devices such as, for example, device controllers, valves, valve positioners, switches, and/or transmitters (e.g., temperature, pressure, and flow rate sensors). The controllers 222 and 224 may be used to communicate configuration and control information to the nodes 226 a-c and 228 a-b and receive information from the nodes 226 a-c and 228 a-b including, for example, configuration information, control information, status information, measurement information, analysis information, etc. Although not shown, the process control systems 218 and 220 may include other process control system equipment including, for example, I/O modules, redundant equipment to provide fault tolerant features, wireless base stations for communicating with wireless field devices, etc., any of which may be represented by one of the nodes 226 a-c and 228 a-b.
The first and second process control systems 218 and 220 also include respective first and second workstation terminals 230 and 232, each of which is communicatively coupled to a respective one of the controllers 222 and 224. The workstation terminals 230 and 232 are communicatively coupled to a local area network (“LAN”) 234, which is communicatively coupled to the Internet 216, and enables the process control systems 218 and 220 to communicate with the example online maintenance system 202. The LAN 234 may be implemented using a wired network (e.g., Ethernet, Token Ring, IEEE 1394, universal serial bus (“USB”), etc.) or a wireless network (e.g., IEEE 802.11 (Wi-Fi®), Bluetooth®, 900 MHz, etc.).
In some example implementations, to substantially reduce or eliminate compromising the security (e.g., data security, network security, etc.), integrity, etc. of the process control systems 218 and 220, some users may elect to not communicatively couple the process control systems 218 and 220 to the LAN 234 and/or may elect to restrict human access to the process control systems 218 and 220. In such a configuration, to communicate information about the process control systems 218 and 220 to the example online maintenance system 202, authorized users with physical access to one or both of the workstation terminals 230 and 232 may initiate processes in the workstation terminals 230 and 232 to collect and organize saved data (e.g., process control system information) intended for the example online maintenance system 202 using encrypted extensible markup language (“XML”) files. The authorized user can then store the encrypted XML files on a portable machine readable medium (e.g., a CD-ROM, a USB memory stick, a magnetic disk, etc.) and physically transport the encrypted XML files from the workstation terminals 230 and 232 to a processor system (e.g., a pen tablet computer 242, a hand held computer 244, a laptop computer 246, or another workstation) communicatively coupled to the Internet 216. The user can then upload the encrypted XML files to the main server 204. The user may periodically or aperiodically repeat the process to update the process control system information stored at the example online maintenance system 202. This example implementation enables the example online maintenance system 202 to provide its services and respond in a timely fashion to changes in the process control systems 218 and 220. As a result, users are able to obtain the benefits of the services provided by the example online maintenance system 202 while ensuring information integrity and security of the process control systems 218 and 220.
The workstation terminals 230 and 232 may store application programs including machine accessible or readable instructions that, when executed, cause the workstation terminals 230 and 232 to exchange information with the controllers 222 and 224 and the example online maintenance system 202. The workstation terminals 230 and 232 may communicate with the controllers 222 and 224 to communicate configuration information and control information to field devices at the nodes 226 a-c and 228 a-b and receive measurement information, analysis information, operating condition information, status information, and other maintenance information (e.g., software version, hardware version, serial number, manufacturer, date of installation, last date of maintenance, etc.). The terminals 230 and 232 may communicate at least some of the information received from the controllers 222 and 224 and the nodes 226 a-c and 228 a-b to the example online maintenance system 202. In addition, the terminals 230 and 232 may receive maintenance information from the example online maintenance system 202 that pertains to the controllers 222 and 224, the nodes 226 a-c and 228 a-b and devices attached thereto, and any other equipment communicatively coupled to the terminals 230 and 232. In this manner, the terminals 230 and 232 may inform users (e.g., an operator, a system engineer, an administrator, etc.) when updates, upgrades, or other maintenance information (e.g., technical documentation, replacement device availabilities, etc.) are available.
The first site 210 also includes a messenger server 236 communicatively coupled to the LAN 234 and configured to communicate with the process control systems 218 and 220. In the illustrated example, the messenger server 236 is configured to generate and/or track alarms and/or events associated with the process control systems 218 and 220. For example, the messenger server 236 may obtain alarms generated by the field device nodes 226 a-c and 228 a-b, the controllers 222 and 224, and/or the workstation terminals 230 and 232. In some example implementations, any of the equipment used to implement the process control systems 218 and 220 may be configured to generate alarms based on, for example, threshold measurement values, hours of operation, efficiency, or any other type of operating condition. Additionally or alternatively, the messenger server 236 may be configured to generate alarms based on operating condition information obtained from the process control systems 218 and 220. In any case, the messenger server 236 may store and track the status of the alarms in a data structure (e.g., a database) and generate reports based on the alarm information.
In the illustrated example, the messenger server 236 may also generate event information. Events may include, for example, equipment status changes (e.g., enabled, disabled, on/off, equipment error, etc.), operator changes, equipment configuration changes (e.g., new configuration downloaded to a field device). The messenger server 236 may store and track the status of the events in a data structure (e.g., a database) and generate reports based on the stored event information.
The example online maintenance system 202 may access the alarm and event information stored in the messenger server 236 and use the alarm and event information to determine whether maintenance may be required or whether any maintenance information (e.g., product documentation, bug reports, knowledgebase articles, product updates, etc.) may be available for any equipment in the process control systems 218 and 220.
A user may use the first and second workstation terminals 230 and 232 to access information obtained from the controllers 222 and 224, the example online maintenance system 202, and/or the messenger server 236. In an example implementation, the terminals 230 and 232 may execute dedicated client-side software applications that establish network connections with the example online maintenance system 202 to exchange maintenance information with the online maintenance system 202. Alternatively or additionally, the terminals 230 and 232 may execute web browsers to access web pages or web-based applications to access the example online maintenance system 202 and to perform substantially the same or similar operations as with a dedicated client-side software application. In any case, a user may use the dedicated client-side application or the web-based application to view, modify, and manage the maintenance information obtained from the controllers 222 and 224, the example online maintenance system 202, and the messenger server 236.
A user may perform maintenance related work via the terminals 230 and 232. For example, the user may instruct the terminals 230 and 232 and/or the example online maintenance system 202 to update or upgrade particular equipment (e.g., field devices, the controllers 222 and 224, etc.) with received software or firmware updates. Also, the user may view summary and detail information pertaining to open service calls associated with the process control systems 218 and 220. In some example implementations, the terminals 230 and 232 may also be configured to view, modify, and/or manage information associated with process control systems in the second and third sites 212 and 214.
The example online maintenance system 202 may obtain maintenance information such as software/firmware updates, replacement device availability, manuals, technical documentation, bug reports, etc. from software vendors and device manufacturers. In the illustrated example, a device manufacturer system 238 and a software vendor system 240 are communicatively coupled to the Internet 216 to provide hardware and software/firmware update information to the example online maintenance system 202. In this manner, the example online maintenance system 202 can select update information pertaining to control systems in each of the sites 210, 212 and 214 and forward the selected information to the respective sites 210, 212, and 214.
The example implementation of
A deployment manager may be used in conjunction with process control systems such as the example system described above with respect to
Using a service management system (“SMS”) 310, updates and/or upgrades can be provided to customer computing devices including portable media 330, one or more non-process control computers 340, and/or one or more process control systems 350, for example. The SMS 310 includes a plurality of update/upgrade and/or other information components including update/upgrade files 312, metadata 314, KBA documents 316, etc. The SMS 310 also includes functionality such as an email server 320, one or more file system and/or update websites 322, 324, an update/upgrade server 326, etc.
The SMS 310 provides a software update delivery service such that, with no effort required on their part, users receive software files and supporting information to manage and install system software updates and/or upgrades. Software updates/upgrades are automatically electronically delivered to the user's specified destination, such as a computer 340, 350 and/or to a process or automation control system 350. Software updates/upgrades may be first delivered to the portable media 330 and/or the workstation 340 connected to but not a part of the process control system, which then deploy the updates/upgrades to the process control system 350, for example. Updates/upgrades can include process control system software, operating system software, anti-virus software, security software, etc. A software deployment manager 360 facilitates download, installation, configuration, and management of software deployment for the process control system 350.
Help files and/or other assistance may be provided for software updates and/or upgrades to assist the user with updates/upgrades for intended system nodes, including a reboot or service disruption, if applicable. The software update/upgrade files 312 and the metadata information 314 for installation can be automatically delivered to one or more computer or control system component. Software can also be manually delivered, for example. Files delivered may include process control system hot fixes, operating system and/or other application security updates, virus pattern updates, anti-virus engine updates, etc. Installation help may include related KBA document(s) 316; a target system's identification number, system name, and location; target nodes in the system; if a reboot is involved (e.g., yes or no); and if a service disruption is involved (e.g., yes or no) such as stopping an application in order to update it.
The SMS 310 provides one or more tables and related stored procedures to match process control system hot fixes to system nodes. Table(s) relate the KBAs 316, hot fixes, and control system software versions, for example. The SMS 310 stores the update and/or upgrade files 312, packages the files, creates help files, and transmits the files to a requesting applet at a customer site (e.g., the computer 340).
Via a website 322, 324, a dashboard tile, such as an “Automated Update Delivery” tile, may be provided with a link to download an applet that pulls files from a download server associated with the SMS 310, such as a file transfer protocol (“FTP”) server and/or other server 320, 322, 324, 326 along with related instructions for installation and use, for example. In an example, no drill down page is involved in downloading via selection of the tile, but downloading is streamlined and automatic. In another example, no automated email message is provided, but the user can subscribe to existing notification messages for newly matched KBAs and security updates.
The dashboard tile may be limited in availability to a certain period of time within which a user may download updates/upgrades (e.g., 30 days) and/or may be displayed to the user as long as updates/upgrades are available for installation. The dashboard tile may be selectable in a support table and/or other location of a website or interface, such as an interface of the software deployment manager 360. In an example, once update/upgrades have been selected for installation, the tile may disappear from the user's view, but a delivery applet 362 may still check with the update server 326 for further updates and/or upgrades.
The delivery applet 362 attempts to retrieve new update/upgrade files periodically, for example (e.g., once every 6 hours). The delivery applet 362 may be installed on any computer or similar processing device 340, 350 with a network connection, such as a LAN, WAN, Internet, and/or other connection. As an example, the delivery applet 362 is designed for high cyber security with file encryption. The delivery applet 362 has a light footprint and may be installed on the same device(s) as other applets/programs for different process control systems. The delivery applet 362 includes documentation to inform the user, for example, that the applet 362 needs file/folder add/edit access to a particular folder on the user computer. In an example, the delivery applet 362 may be in use for more than one instance. For example, both a customer user and a service person may download and use the same applet in their respective computers. In an example, the delivery applet 362 provides a user with a simple interface with a get update and/or test button, for example. The applet 362 may also generate a user-readable log file and/or other record indicating success of failure for server access, file writing, installation, etc.
In an example, upgrade/update installation help messages are delivered to the user's computer 340, 350 along with the files 312 for the upgrade and/or update. User maintenance work orders may be initiated using the installation messages as well. Additional files 312 delivered may include updates and/or upgrades for device managers and snap-ons, device description (“DD”) files, electronic device description (“EDD”) files, etc.
A user can log-in or otherwise access a workstation in communication with a process control system to deploy updates and/or additional system software. As shown, for example, in
The system tray 410 may include a button, icon, link, and/or other indicator to a software deployment manager 415. Selection of the indicator 415 launches an interface for the software deployment manager for the user.
The sidebar 420 may be part of an interface or other display for user review and interaction with the control system, for example. The sidebar 420 lists one or more update or upgrade types 425 and a number of nodes 427 in the system affected by the update/upgrade. For example, software update/upgrade types 425 may include firmware updates/upgrades, system version upgrades, system software updates/upgrades, Microsoft® software updates/upgrades, anti-virus software update/upgrades, etc.
The control panel 430 may be part of an automation system control panel and/or may be a separate control panel for system maintenance and/or software deployment, for example. As shown, for example, in
In certain examples, including but not limited to those discussed above, a software deployment manager accessible from a user system facilitates delivery of files to a user's computer rather than the user manually pulling down (e.g., downloading) files from a website. In certain examples, the deployment manager (e.g., the deployment manager 360 of
As discussed above, a software program, such as an applet, a portion of program code, and/or other executable code or software periodically checks to determine if an update and/or upgrade is available and applicable to be downloaded. As discussed above, an update fixes a bug and/or improves upon existing software (e.g., updating from version 1.8 to 1.9), while an upgrade provides a new and improved version (e.g., upgrading from version 1 to version 2). In some examples, different files and documentation accompany updates versus upgrades. However, the deployment system treats both updates and upgrades similarly. Upgrades may include a larger amount of software code to be distributed, whereas updates may be delivered on a smaller scale through a software delivery service to process control system components.
In some examples, a user can configure software deployment to be as automated or as user-corrected as possible in some or all aspects of monitoring, retrieval, and deployment. An interface may allow a user to select a degree or extent of automation for different tasks and/or types/sources of data, for example. A user may provide for automated download, automated installation, etc. for one or more types and/or sources of data, for example. A user may automate download of updates and upgrades but manually trigger installation, or vice versa (or may automate both parts of the process). A user may specify options on a computer-by-computer basis, for groups of computers and/or other processing devices, for an entire network or system, etc. For example, a user may select a lead set of machines to automatically install and test updates, and may then install the update on the remainder of machines later after reviewing how the first group of machines functions with the update.
In some examples, a deployment manager integrates a KBA viewer into the deployment manager interface. A user may review what will change when they are ready to implement the change through an update or upgrade. In contrast, a user may access one website to read materials on an update and then accesses a different provider to install the update.
The software deployment manager described herein may operate in conjunction with a process control system including software layered on hardware. The deployment manager may be integrated to provide additional options within a process control system control panel interface, for example.
General updates may provide a “one size fits all” approach. However, in certain examples, an update/upgrade is performed on a process control system with knowledge of what components are in the system and how the system is configured In this case, update(s) and/or upgrade(s) are then selected based on the particular process control system (e.g., certain controllers, certain products, etc.) and only the implicated update(s)/upgrade(s) that have been tested with the present system components are provided to avoid a disruption to the system. For example, inappropriate updates are avoided to help ensure that a disruption does not occur (e.g., a shutdown or failure of process control system components due to an incompatible update in system software).
As described above, a software deployment manager application may be used for, among other things, update/upgrade deployment, deployment group setup, and review of deployment history. An update deployment view or display provides visibility to hardware with pending updates. This view may similarly provide information regarding upgrades. This view provides warning indicators for reboot or service disruptions and provides an ability to deploy en-mass or to select devices for deployment to help accommodate ongoing operations. Updates and/or upgrades may also be dismissed and/or deferred to a later time.
A deployment group setup view may be an optional view provided for more experienced users. System hardware may be grouped to assign different schedules and degrees of update/upgrade automation. Groups may also be formed to implement update/upgrade deployment strategies where some parts of the system are updated/upgraded first to confirm results in less sensitive process areas. Groups may also be formed where some parts of the system are managed by different people, for example.
A deployment history view provides a history of update/upgrade deployments. This view also provides visibility to dismissed and/or deferred updates/upgrades and provides an ability to reactivate and/or reschedule them, for example.
As illustrated, for example, in
Using the interface 500, a user may select an update 505 and view which node(s) 510 include the hardware affected by the update. The user may also see a type 515 of hardware involved, as well as a hardware version 520 and a software version 525. The deployment interface 500 provides a list of queued action(s) 530 for an update, such as download or install, as well as a type 535 for the update (e.g., control system update, operating system update, version upgrade, etc.). An update name 540 is also provided along with an indication of whether an update will result in a system reboot 545 and/or a system operation disruption 550, for example.
The interface 500 also provides a summary 570 of update information, such as a number of nodes having queued actions along with how many of those actions are expected to cause service disruption and/or require post installation reboot to finish. The interface 500 also includes action buttons to initiate or take a selected action 575 or to dismiss a selected action 577.
When the “Take Action” button 575 is selected, the deployment application starts the queued download or install action. Affected row(s) are removed from the deployment interface 500 and are added to a history view as requested item(s). When the “Dismiss Action” button 577 is selected, the user may set a date for the queued action to reappear in the deployment interface 500 and may optionally enter a textual note regarding the action. In an example, a modal popup may be used to enter the node and/or a bar at the bottom of the interface 500 can be used for note entry and display. A dismissed item is removed from the deployment interface 500 and added as a dismissed item in the software update history view.
Take action 575 and dismiss action 577 may act on results of a search via a search input area 580 in the interface 500. For example, a user may query for a particular update name and/or device type to act or dismiss regardless of deployment group.
The reboot column 545 indicates whether a post-installation reboot of a workstation is required to complete the installation. The disruption column 550 indicates whether there is a possibility of an interruption in the operation of an affected device or accessibility during the time that installation is underway. For example, a simplex controller may become momentarily unavailable during the installation of a hot fix. As another example, a Microsoft-related update may force the closure of any open Internet Explorer® windows.
An icon or indicator in a KBA column 560 provides a modal pop-up window displaying a KBA document related to the update, including relevant details for disruption and reboot items. In the case of version upgrades, release notes may be presented. In an example, a KBA article identification number and name associated with the update/upgrade may be displayed as a hyperlink to enable users to retrieve a knowledge base article of interest related to the software/firmware update or upgrade.
The interface 500 also provides functionality to organize 590 information displayed and/or views 595 to select among various options and/or ways of displaying available information, for example.
As delivered, all devices in a process control system are organized in one “main” or default deployment group. A deployment group defines a schedule and degree of update automation for system node(s) assigned to that group.
As shown, for example, in
As shown, for example, in
Dismissed items may be edited to reset or clear the reactivation date 880 and/or reset or clear the dismissal note 870, for example. A modal popup or bar may be used for such editing, for example.
As an example, the history interface 800 may provide an update history for a workstation maintenance group 810 including a plurality of workstation maintenance nodes 820. The history interface 800 provides dates and times 830 when a series of updates 840, including operating system and process control system updates were acted upon. The actions/results 850 may include download requested, download confirmed, install requested, install confirmed, dismissed, etc. The history interface 800 may also provide an indication 860 of who or what requested or otherwise triggered the update 840. For example, an update/upgrade may be triggered according to a schedule, by a particular user, by a control system device, etc. If an action 850 indicates a dismissal of an update, for example, the dismissal note 870 may indicate a reason for dismissal, a plan for reactivation, and/or other explanation, for example. If a dismissed update and/or upgrade is to be reactivated, the reactivation date 880 provides a date and time for reactivation of the update/upgrade 840 at one or more nodes 820 in a group 810.
In an example, a user can search for devices in a process control system for which a firmware and/or software update/upgrade is applicable. Search results may be saved for later retrieval and use. A user with sufficient access privilege may open a saved search and update software and/or firmware for some or all of the devices in the saved search.
In an example, a system preference allows a user to specify allocated disk space for updates and/or upgrades. When the allocated space limit is reached, a disk space housekeeping task deletes files in file date order, oldest first, protecting from deletion any file (e.g., update/upgrade binary, update/upgrade metadata, KBA, etc.) currently referenced in an update deployment view.
A sidebar and/or other display graphic provides a count for a number of nodes in the control system that have updates/upgrades waiting to be installed for firmware, system version, system software, operating system, and anti-virus. When a user positions a display cursor over a quantity (e.g., a mouse over), a popup or flyout identifies the node names, for example. In an example, if a user has sufficient access privilege, clicking on or otherwise selecting a quantity opens a deployment application with a focus on the named nodes. Clicking on or otherwise selecting other parts of the graphic may generally open the software deployment application. A bar, such as a colored bar, may represent relative quantities of nodes with and without applicability for an update/upgrade. For example, a green bar may be presented if there are no nodes implicated in an update/upgrade. A yellow bar may represent nodes that involve one or more updates/upgrades, for example.
The processor 912 of
The system memory 924 may include any desired type of volatile and/or non-volatile memory such as, for example, static random access memory (“SRAM”), dynamic random access memory (“DRAM”), flash memory, read-only memory (“ROM”), etc. The mass storage memory 925 may include any desired type of mass storage device including hard disk drives, optical drives, tape storage devices, etc.
The I/O controller 922 performs functions that enable the processor 912 to communicate with peripheral input/output (“I/O”) devices 926 and 928 and a network interface 930 via an I/O bus 932. The I/O devices 926 and 928 may be any desired type of I/O device such as, for example, a keyboard, a video display or monitor, a mouse, etc. The network interface 930 may be, for example, an Ethernet device, an asynchronous transfer mode (“ATM”) device, an 802.11 device, a DSL modem, a cable modem, a cellular modem, etc. that enables the processor system 910 to communicate with another processor system.
While the memory controller 920 and the I/O controller 922 are depicted in
At 1002, a system configuration is determined for a process control system. For example, as illustrated in
At 1004, a repository (e.g., the update files 312, metadata 314, and KBA documents 316 of
At 1006, update(s) and/or upgrade(s) applicable to the system configuration are selected. Selection may be automated and/or manual by a user as specified in the system configuration (e.g., using the software deployment manager 360 of
At 1008, selected update(s) and/or upgrade(s) are downloaded to the process control system. Downloads may occur automatically and/or based on user initiation, for example. Downloads may occur via a network, such as the Internet or a virtual private network (“VPN”) or by a dedicated connection, for example. Downloads can occur automatically and/or upon user authorization via a graphical user interface (e.g., the update deployment interface 500 of
At 1010, downloaded update(s) and/or upgrade(s) are deployed to components of the process control system. For example, a deployment manager (e.g., the software deployment manager 360 of
In certain embodiments, an interface (e.g., the update deployment interface 500 of
One or more of the operations of the method 1000 may be implemented alone or in combination in hardware, firmware, and/or as a set of instructions in software, for example. Certain examples may be provided as a set of instructions residing on a computer-readable medium, such as a memory, hard disk, DVD, or CD, for execution on a general purpose computer or other processing device.
Certain examples may omit one or more of these operations and/or perform the operations in a different order than the order listed. For example, some operations may not be performed in certain examples. As a further example, certain operations may be performed in a different temporal order, including simultaneously, than listed above.
At 1102, a graphical user interface (e.g., the update deployment interface 500 of
For example, a repository (e.g., the update files 312, metadata 314, and/or KBA files 316 of
At 1104, software deployment and management options can be configured via the interface. For example, the interface (e.g., the deployment group setup interface 700 of
At 1106, downloading and installation of the one or more pending software updates and/or upgrades is facilitated according to user input and process control system configuration. Downloads may occur automatically and/or based on user initiation (e.g., via the deployment interface 500 of
One or more of the operations of the method 1100 may be implemented alone or in combination in hardware, firmware, and/or as a set of instructions in software, for example. Certain examples may be provided as a set of instructions residing on a computer-readable medium, such as a memory, hard disk, DVD, or CD, for execution on a general purpose computer or other processing device.
Certain examples may omit one or more of these operations and/or perform the operations in a different order than the order listed. For example, some operations may not be performed in certain examples. As a further example, certain operations may be performed in a different temporal order, including simultaneously, than listed above.
Certain examples contemplate methods, systems and computer program products on any machine-readable media to implement functionality described above. Certain examples may be implemented using an existing computer processor, or by a special purpose computer processor incorporated for this or another purpose or by a hardwired and/or firmware system, for example.
Certain examples include computer-readable media for carrying or having computer-executable instructions or data structures stored thereon. Such computer-readable media may be any available media that may be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such computer-readable media may comprise RAM, ROM, PROM, EPROM, EEPROM, Flash, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of computer-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. Combinations of the above are also included within the scope of computer-readable media. Computer-executable instructions comprise, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
Generally, computer-executable instructions include routines, programs, objects, components, data structures, etc., that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of program code for executing steps of certain methods and systems disclosed herein. The particular sequence of such executable instructions or associated data structures represent examples of corresponding acts for implementing the functions described in such operations.
Examples may be practiced in a networked environment using logical connections to one or more remote computers having processors. Logical connections may include a local area network (LAN) and a wide area network (WAN) that are presented here by way of example and not limitation. Such networking environments are commonplace in office-wide or enterprise-wide computer networks, intranets and the Internet and may use a wide variety of different communication protocols. Those skilled in the art will appreciate that such network computing environments will typically encompass many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Examples may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination of hardwired or wireless links) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
An exemplary system for implementing the overall system or portions of the invention might include a general purpose computing device in the form of a computer, including a processing unit, a system memory, and a system bus that couples various system components including the system memory to the processing unit. The system memory may include read only memory (ROM) and random access memory (RAM). The computer may also include a magnetic hard disk drive for reading from and writing to a magnetic hard disk, a magnetic disk drive for reading from or writing to a removable magnetic disk, and an optical disk drive for reading from or writing to a removable optical disk such as a CD ROM or other optical media. The drives and their associated computer-readable media provide nonvolatile storage of computer-executable instructions, data structures, program modules and other data for the computer.
As an example, the methods 1000 and/or 1100 for automated software deployment and management may be implemented in software and/or in hardware as part of and/or in communication with a process control system, such as the process control system 100 described above. Software instructions for executing the methods may be stored on a machine readable medium executable by a computer and/or other processing device, for example. As shown, for example, in
The system configurator 1210 analyzes configuration information and other parameters for the control system 1250. Using the system configurator 1210, software deployment groups, automation options for download and/or installation of updates/upgrades, and/or other user preferences/settings described above may be configured, for example. Configuration information may be established for all or part(s) of the control system 1250. A user may configure software update/upgrade and deployment to be as automated or as user-corrected as desired. A deployment group may specify download and/or installation parameters for individual computers, groups of computing devices, an entire network, etc. A lead or initial group of devices may be identified for a first installation of an update and/or upgrade followed by installation on a main group pending verification of proper installation and operation of the lead group, for example.
The update/upgrade monitor 1220 checks the repository 1240 for an update and/or upgrade. The update/upgrade monitor 1220 receives control system configuration information from the system configurator 1210 and checks for updates and/or upgrades applicable to the configuration. The update/upgrade monitor 1220 alerts the deployment manager 1230 if applicable updates(s) and/or upgrade(s) are found.
The deployment manager 1230 selects update(s) and/or upgrade(s) applicable to the system configuration are selected. Selection may be automated and/or manual by a user as specified in the system configuration. For example, the deployment manager 1230 understands the configuration of the control system and only selects the updates and upgrades for that system configuration. The deployment manager 1230 downloads selected update(s) and/or upgrade(s) to the control system 1250. Downloads may occur automatically and/or based on user initiation, for example. Downloads may occur via a network, such as the Internet or a virtual private network (“VPN”) or by a dedicated connection, for example.
The deployment manager 1230 deploys downloaded update(s) and/or upgrade(s) to components of the control system 1250. For example, the deployment manager 1230 monitors remotely-located and/or local process control systems and associated equipment and receives, over a network, update files and metadata to automatically deploy updates where identified. The deployment manager 1230 is programmed or otherwise configured to accept and accommodate updates that have service disruption or reboot behaviors and presents options to a customer for installation at the customer's convenience, for example.
Thus, the deployment manager 1230 may be used in conjunction with the update/upgrade monitor 1220 and the system configurator 1210 to access the repository 1240, identify files applicable to the particular control system 1250 and system configuration, and perform file deployment according to a configured degree of autonomy. The deployment manager 1230, update/upgrade monitor 1220, and/or system configurator 1210 may provide a user interface for interaction with a user. Such an interface may be a Web and/or other network-accessible interface, for example. Software update/upgrade monitoring may be integrated with update/upgrade deployment and system management, for example. In an example, using the deployment manager 1230, a user may update all or part of the control system 1250 from a single workstation within the system 1250.
As an example, an update or upgrade code package is provided with metadata identifying a target computer or group of computers for update/upgrade. Objects provided in the code package may be executed to provide an update and/or upgrade and replace a previous version. As an example, an eXtensible Markup Language (“XML”) structure may be used to distribute metadata for software update(s)/upgrade(s).
While the foregoing disclosure has provided certain examples, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims, either literally or under the doctrine of equivalents.
|Patente citada||Fecha de presentación||Fecha de publicación||Solicitante||Título|
|US5826080 *||2 Ago 1995||20 Oct 1998||Cegelec||Method of scheduling successive tasks|
|US6078747 *||5 Ene 1998||20 Jun 2000||Jewitt; James W.||Application program interface to physical devices|
|US6654645 *||16 Ene 2001||25 Nov 2003||Siemens Aktiengesellschaft||Control system having a personal computer to control a process|
|US6931328 *||8 Nov 2002||16 Ago 2005||Optiscan Biomedical Corp.||Analyte detection system with software download capabilities|
|US6990660 *||20 Sep 2001||24 Ene 2006||Patchlink Corporation||Non-invasive automatic offsite patch fingerprinting and updating system and method|
|US7093246 *||20 Dic 2002||15 Ago 2006||International Business Machines Corporation||Automated updates of software and systems|
|US7120391 *||6 Jul 2001||10 Oct 2006||Endress + Hauser Gmbh + Co.||Field transmitter|
|US7386845 *||24 Mar 2005||10 Jun 2008||Network Appliance, Inc.||Automated compatibility and upgrade/downgrade knowledge base|
|US7496910 *||15 Mar 2005||24 Feb 2009||Desktopstandard Corporation||System for policy-based management of software updates|
|US7516450 *||23 Sep 2003||7 Abr 2009||Ricoh Company, Ltd.||Remote management system, intermediary apparatus therefor, and method of updating software in the intermediary apparatus|
|US7546594 *||15 Dic 2003||9 Jun 2009||Microsoft Corporation||System and method for updating installation components using an installation component delta patch in a networked environment|
|US7555749 *||10 Mar 2003||30 Jun 2009||Microsoft Corporation||Software updating system and method|
|US7644404 *||4 Jun 2004||5 Ene 2010||Hewlett-Packard Development Company, L.P.||Network having customizable generators and electronic device having customizable updating software|
|US7747995 *||11 Abr 2006||29 Jun 2010||Research In Motion Limited||Method and system for controlling software version updates|
|US7747997 *||12 Nov 2003||29 Jun 2010||Hewlett-Packard Development Company, L.P.||Firmware update in electronic devices employing SIM card for saving metadata information|
|US7784044 *||2 Dic 2002||24 Ago 2010||Microsoft Corporation||Patching of in-use functions on a running computer system|
|US7814476 *||31 Oct 2002||12 Oct 2010||Oracle America, Inc.||Systems and methods for updating software|
|US7814480 *||1 Sep 2006||12 Oct 2010||Seiko Epson Corporation||Control software updating technique for a network apparatus|
|US7818405 *||30 Jun 2005||19 Oct 2010||Samsung Electronics Co., Ltd.||Method and system for providing device-initiated software upgrades|
|US7831412 *||31 Mar 2008||9 Nov 2010||Symantec Corporation||Systems and methods for providing guidance by category on the potential impact of an application on the health of a computing system|
|US7844766 *||3 Oct 2008||30 Nov 2010||XETA Technologies, Inc.||System and method for location specific computer enabled services/monitoring|
|US7865889 *||14 Sep 2006||4 Ene 2011||Crimson Corporation||Systems and methods for verifying the compatibility of software with a group of managed nodes|
|US7895592 *||24 Mar 2005||22 Feb 2011||Oracle International Corporation||Patch impact analyzer|
|US7966278 *||27 Mar 2008||21 Jun 2011||Symantec Corporation||Method for determining the health impact of an application based on information obtained from like-profiled computing systems using clustering|
|US8051414 *||1 Ago 2005||1 Nov 2011||Siemens Aktiengesellschaft||Method and system for remote software updating of a medical device|
|US8171547 *||1 Dic 2009||1 May 2012||Trend Micro Incorporated||Method and system for real time classification of events in computer integrity system|
|US8176483 *||30 Dic 2005||8 May 2012||Sap Ag||Software maintenance management|
|US8473940 *||15 May 2008||25 Jun 2013||Canon Kabushiki Kaisha||Communication apparatus, data processing system, control method for communication apparatus, control method for data processing system, and program therefor|
|US8490075 *||23 Nov 2009||16 Jul 2013||Nokia Corporation||Method and apparatus for optimizing an exchange of service updates|
|US8516582 *||25 Abr 2012||20 Ago 2013||Trend Micro Incorporated||Method and system for real time classification of events in computer integrity system|
|US8527977 *||14 Sep 2007||3 Sep 2013||Mcafee, Inc.||Software uninstallation system, method and computer program product|
|US8549509 *||9 Jul 2008||1 Oct 2013||International Business Machines Corporation||Modifying an information technology architecture framework|
|US8665466 *||30 Ago 2007||4 Mar 2014||Ricoh Company, Ltd.||Image forming apparatus, program updating method and computer-readable storage medium|
|US20030046675 *||17 Abr 2002||6 Mar 2003||William Cheng||Automatic updating of diverse software products on multiple client computer systems|
|US20030046676 *||17 Abr 2002||6 Mar 2003||William Cheng||Automatic updating of diverse software products on multiple client computer systems|
|US20030200541 *||5 Jun 2003||23 Oct 2003||William Cheng||System, method, and computer program product for uninstalling computer software|
|US20040088698 *||4 Nov 2002||6 May 2004||Claiborne Andrew E.||Method, apparatus and means for silently customizing software within a multi-platform environment|
|US20040088699 *||6 Nov 2002||6 May 2004||Charles Suresh||System and method for measuring code segment performance|
|US20040187103 *||15 Sep 2003||23 Sep 2004||Wickham Robert T.||Software updating system and method|
|US20040230828 *||7 Abr 2004||18 Nov 2004||Defuria Richard M.||Software update and patch audit subsystem for use in a computer information database system|
|US20050273779 *||4 Ago 2005||8 Dic 2005||William Cheng||Automatic updating of diverse software products on multiple client computer systems|
|US20060015862 *||20 Sep 2005||19 Ene 2006||National Instruments Corporation||Reconfigurable measurement system utilizing a programmable hardware element and fixed hardware resources|
|US20060184927 *||14 Feb 2005||17 Ago 2006||Joe Deblaquiere||Software certification and update process|
|US20070168919 *||1 Dic 2006||19 Jul 2007||Cassatt Corporation||Automated deployment and configuration of applications in an autonomically controlled distributed computing system|
|US20080288933 *||30 Abr 2008||20 Nov 2008||Endress + Hauser Flowtec Ag||Method for start-up and/or reconfiguration of a programmable field-device|
|US20080288936 *||15 May 2008||20 Nov 2008||Canon Kabushiki Kaisha||Communication apparatus, data processing system, control method for communication apparatus, control method for data processing system, and program therefor|
|US20130042230 *||14 Feb 2013||International Business Machines Corporation||Software service notifications based upon software usage, configuration, and deployment topology|
|US20140109079 *||30 Ago 2013||17 Abr 2014||William Cheng||Software uninstallation system, method and computer program product|
|1||*||Heiser, et al., "Twoards Trustworthy Computing Systems: Taking Microkernels to the Next Level"; 2007 ACM; [retrieved on 8-26-2014]; Retrieved from Internet ;pp3-11.|
|2||*||John, et al., "Performance Improvement of Wireless Network Based on Effective Data Transmission"; 2008 IET; [retrieved on 8-26-2014]; Retrieved from Internet ;pp134-137.|
|3||*||Krishnamurthy, et al., "Data Tragging Architecture for System Monitoring in Dynamic Enviroments"; 2008 IEEE; [retrieved on 3-19-2014]; Retrieved from Internet ;pp390-397.|
|4||*||Liba, "Computer Performance Measurement and Evaluation Methods: Analysis and Applications"; 1978 MIT press; [retrieved on 11-15-2013]; Retrieved from eDan (NPL of application 11/567,450); pp14-15, 20-23, 74-77, 114-117.|
|5||*||Meyer, Rakotonirainy, "A Survey of Research on Context-Aware Homes"; 2003, Australian Computer Society, Inc.; [retrieved on 8-26-2014]; Retrieved from Internet ;pp1-10.|
|6||*||Parlavantzas, et al., "Design Support for Componentising and Grid-enabling Scientific Applications"; 2007 ACM; [retrieved on 3-19-2014]; Retrieved from Internet ;pp31-38.|
|7||*||Roehm, et al., "Towards Identification of Software Improvements and Specificaiton Updates By Comparing Monitored and Specified End-User Behavior"; 2013 IEEE; [retrieved on 3-19-2014]; Retrieved from Internet ;pp464-467.|
|8||*||Shen, et a., "Reference-Driven Performance Anomaly Identification"; 2009 ACM;[retrieved on 3-19-2014]; Retrieved from Internet ;pp85-96.|
|9||*||Tambe, et al., "Upgrading outdated rectifier control systems -- needs and challenges"; 2006 IEE; [retrieved on 8-26-2014]; Retrieved from Internet ;pp1-5.|
|Patente citante||Fecha de presentación||Fecha de publicación||Solicitante||Título|
|US8122434 *||29 May 2009||21 Feb 2012||Invensys Sytems, Inc.||Methods and apparatus for control configuration control objects associated with a track attribute for selecting configuration information|
|US8127060 *||29 May 2009||28 Feb 2012||Invensys Systems, Inc||Methods and apparatus for control configuration with control objects that are fieldbus protocol-aware|
|US8250223 *||9 Nov 2009||21 Ago 2012||Chi Mei Communication Systems, Inc.||Portable electronic device and method for downloading a firmware loader from a host computer|
|US8347283 *||17 Jul 2007||1 Ene 2013||Abb Research Ltd.||System and method for automatic installation and maintenance of hardware and software in a distributed computer system|
|US8554797 *||16 Dic 2011||8 Oct 2013||Sap Ag||System and method for modular business applications|
|US8584087 *||11 Dic 2009||12 Nov 2013||Sap Ag||Application configuration deployment monitor|
|US8595328 *||3 Nov 2010||26 Nov 2013||International Business Machines Corporation||Self-updating node controller for an endpoint in a cloud computing environment|
|US8869112||30 Nov 2010||21 Oct 2014||Sap Se||System and method for modular business applications|
|US8898660||25 Nov 2008||25 Nov 2014||Fisher-Rosemount Systems, Inc.||Systems and methods to provide customized release notes during a software system upgrade of a process control system|
|US8918775||12 Jul 2013||23 Dic 2014||Ca, Inc.||Dynamic release control of software application version changes|
|US8959183 *||12 Feb 2010||17 Feb 2015||Code Systems Corporation||System for downloading and executing a virtual application|
|US9052976 *||8 Nov 2010||9 Jun 2015||Mckesson Financial Holdings||Methods, apparatuses and computer program products for facilitating efficient deployment of software|
|US9092762 *||5 Abr 2012||28 Jul 2015||Welch Allyn, Inc.||Medical device maintenance system|
|US9104517||27 Ene 2010||11 Ago 2015||Code Systems Corporation||System for downloading and executing a virtual application|
|US9106425||21 Nov 2012||11 Ago 2015||Code Systems Corporation||Method and system for restricting execution of virtual applications to a managed process environment|
|US20100153941 *||12 Dic 2008||17 Jun 2010||Lazar Borissov||Flexible content update via deployment order template|
|US20100241752 *||9 Nov 2009||23 Sep 2010||Chi Mei Communication Systems, Inc.||Portable electronic device and method for downloading a firmware loader from a host computer|
|US20110145789 *||11 Dic 2009||16 Jun 2011||Sap Ag||Application configuration deployment monitor|
|US20110185043 *||12 Feb 2010||28 Jul 2011||Code Systems Corporation||System for downloading and executing a virtual application|
|US20120060151 *||22 Ago 2011||8 Mar 2012||Lsis Co., Ltd.||System and method for updating firmware|
|US20120110394 *||3 May 2012||International Business Machines Corporation||Self-updating node controller for an endpoint in a cloud computing environment|
|US20120117532 *||8 Nov 2010||10 May 2012||Mckesson Financial Holdings Limited||Methods, apparatuses & computer program products for facilitating efficient deployment of software|
|US20120158788 *||21 Jun 2012||Sap Ag||System and Method for Modular Business Applications|
|US20120221126 *||30 Ago 2012||General Electric Company||Extraction of a foundation fieldbus device information for enhanced device selection and data validation|
|US20120254859 *||4 Oct 2012||Sony Corporation||Method and apparatus for downloading software updates to place user terminal into a desired configuration state|
|US20120297022 *||17 Ene 2011||22 Nov 2012||Yves Maetz||Method, system and device for execution of a software application|
|US20130263088 *||27 Mar 2012||3 Oct 2013||Microsoft Corporation||Dynamic plugin(s) for cloud application(s)|
|US20130268890 *||5 Abr 2012||10 Oct 2013||Welch Allyn, Inc.||Medical Device Maintenance System|
|WO2013180821A1 *||15 Mar 2013||5 Dic 2013||Gritzo Louis Alan||Wireless fire protection valve inspection and monitoring systems, and methods for automated inspection and monitoring of fire protection systems|
|WO2014145962A2 *||17 Mar 2014||18 Sep 2014||Ardent Sound, Inc.||Methods and systems for controlling medical device usage|
|WO2014151333A1 *||13 Mar 2014||25 Sep 2014||Vivint, Inc.||Methods for prompting a user to use enhanced automation system features, and systems and devices related thereto|
|Clasificación de EE.UU.||700/86, 717/173|
|Clasificación internacional||G05B19/42, G06F9/44|
|12 Dic 2008||AS||Assignment|
Owner name: FISHER-ROSEMOUNT SYSTEMS, INC., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:VAN CAMP, KIM O.;REEL/FRAME:021984/0282
Effective date: 20081124